top title background image
flash

utente_5833.xls

Status: finished
Submission Time: 2020-07-06 08:09:03 +02:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    243452
  • API (Web) ID:
    382603
  • Analysis Started:
    2020-07-06 08:17:34 +02:00
  • Analysis Finished:
    2020-07-06 08:27:01 +02:00
  • MD5:
    8e2b0263618f514d8a135b916fbcd830
  • SHA1:
    4954896e52022f359e643ba068539c50c3303b61
  • SHA256:
    3cb9c35a46c46808ec4d5f9780cd55588814bc3e9c1fe78d01a4ff9da1089974
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 60
System: unknown
malicious
Score: 56
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior

IPs

IP Country Detection
185.220.34.93
Russian Federation

Domains

Name IP Detection
line.winneratlaw.com
185.220.34.93

URLs

Name Detection
http://line.winneratlaw.com/setup.exe

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\50F20000
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jan 28 13:33:37 2020, mtime=Mon Jul 6 05:19:19 2020, atime=Mon Jul 6 05:19:19 2020, length=8192, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\utente_5833.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jan 28 13:45:41 2020, mtime=Mon Jul 6 05:19:19 2020, atime=Mon Jul 6 05:19:19 2020, length=155136, window=hide
#
C:\Users\user\Desktop\A1F20000
Applesoft BASIC program data, first line number 16
#